home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page354.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  135KB  |  817x1045  |  8-bit (256 colors)
Labels: book | booth | daily | door | person | plant | sidewalk | sky | tie | tree | windowpane
OCR: 286 SECTION CHAPTER How long does it take to break strong encryption? Encryption FIGURE 5-54 methods can be broken by the use of expensive specialized, code- -break- To discover PIN by ing computers The cost of f these machines substantial, but not beyond brute force, criminal must try, the reach of government agencies, major corporations, and organized at most 10,000 possibilities crime. Encryption methods can also be broken by standard computer hard- Finding the key to computer ware -supercomputers, mainframes, workstations, and even personal data encrypted using 32-bit computers. These computers typically break codes using brute force key would involve about 4.2 bil- attack which consists trying all possible keys (Figure 5-54 lion possibilities The length of a computer-readable encrypti ...